VMware testing on Fedora Linux 39 via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5950X 16-Core (32 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 258GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Fedora Linux 39, Kernel: 6.6.12-200.fc39.x86_64 (x86_64), Compiler: GCC 13.2.1 20231205, File-System: xfs, Screen Resolution: 1280x800, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles performance with various sample files. GPU computing via NVIDIA OptiX and NVIDIA CUDA is currently supported as well as HIP for AMD Radeon GPUs and Intel oneAPI for Intel Graphics. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 5950X 16-Core (32 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 258GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Fedora Linux 39, Kernel: 6.6.12-200.fc39.x86_64 (x86_64), Compiler: GCC 13.2.1 20231205, File-System: xfs, Screen Resolution: 1280x800, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 February 2024 10:37 by user .